Get my own profile
Public access
View all44 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Jonathan SmithProfessor of Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
- Ravi KuberAssociate Professor, UMBCVerified email at umbc.edu
- Flynn WolfUniversity of Maryland at Baltimore CountyVerified email at umbc.edu
- John SonchackPostdoctoral Researcher, Princeton UniversityVerified email at princeton.edu
- Eric KellerUniversity of Colorado, BoulderVerified email at colorado.edu
- Daniel S. RocheAssociate Professor of Computer Science, United States Naval AcademyVerified email at usna.edu
- Micah SherrCallahan Family Professor of Computer Science, Georgetown UniversityVerified email at cs.georgetown.edu
- Philipp MarkertFormer researcher @ Ruhr University BochumVerified email at rub.de
- Seung Geol ChoiProfessor, US Naval AcademyVerified email at usna.edu
- Markus DürmuthProfessor for IT Security, Leibniz University HannoverVerified email at itsec.uni-hannover.de
- Katherine L. GibsonUniversity of PennsylvaniaVerified email at seas.upenn.edu
- Maximilian GollaCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Andrew G. WestPrincipal Research Scientist, Verisign / Verisign LabsVerified email at verisign.com
- Travis MayberryUS Naval AcademyVerified email at usna.edu
- Daniel V BaileyRuhr University BochumVerified email at sth.rub.de
- Hirak RayUser Experience Researcher, UVaVerified email at umbc.edu
- Andreas HaeberlenUniversity of PennsylvaniaVerified email at cis.upenn.edu
- Jian ChangUniversity of PennsylvaniaVerified email at cis.upenn.edu
- Insup LeeProfessor, Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
- Benjamin SappWaymoVerified email at google.com